CN110247921A - A kind of polled data cochain method and its equipment for applying intelligent contract - Google Patents

A kind of polled data cochain method and its equipment for applying intelligent contract Download PDF

Info

Publication number
CN110247921A
CN110247921A CN201910547041.5A CN201910547041A CN110247921A CN 110247921 A CN110247921 A CN 110247921A CN 201910547041 A CN201910547041 A CN 201910547041A CN 110247921 A CN110247921 A CN 110247921A
Authority
CN
China
Prior art keywords
client
voting data
voting
public key
intelligent contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910547041.5A
Other languages
Chinese (zh)
Inventor
杨慧
吉建勋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ai Morui Strategic Technology Co Ltd
Original Assignee
Beijing Ai Morui Strategic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ai Morui Strategic Technology Co Ltd filed Critical Beijing Ai Morui Strategic Technology Co Ltd
Priority to CN201910547041.5A priority Critical patent/CN110247921A/en
Publication of CN110247921A publication Critical patent/CN110247921A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C13/00Voting apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application discloses a kind of polled data cochain methods and its equipment for applying intelligent contract, which comprises block chain node receives the polled data cochain request that the first client is sent;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client;Receive the inquiry request of the polled data of the second client;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client;After verification passes through, the polled data inquiry request is sent to first client, includes the second client public key in the polled data inquiry request;Receive the polled data inquiry response that first client is sent;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, and after verification passes through, the polled data of second client public key encryption is executed cochain process.The application can disclose polled data cochain credible.

Description

Voting data chaining method and equipment applying intelligent contract
Technical Field
The present application relates to the field of block chaining technologies, and in particular, to a voting data chaining method and apparatus using an intelligent contract.
Background
At present, a block chain technology is based on a decentralized peer-to-peer network, and open source software is used for combining a cryptography principle, time sequence data and a consensus mechanism to ensure the consistency and the persistence of each node in a distributed database, so that information can be immediately verified and traceable, but is difficult to tamper and cannot be shielded, and a set of private, efficient and safe shared value system is created.
The existing voting platform adopts a centralized database, and stores the contents of the voting times, the voting time, the cell phone used by the user for voting and the like of the commodity; however, the database of the voting platform has the problems that the data is tampered, the authenticity of the data cannot be guaranteed, the voting operation platform modifies the voting times of a certain commodity, and the user comment is deleted. Especially for some small-scale voting platforms, the data security and authenticity of the goods cannot be guaranteed.
Therefore, how to store the data of the voting platform on the blockchain in a non-falsifiable and trusted manner based on the blockchain becomes a problem to be solved urgently.
The above is only for the purpose of assisting understanding of the technical solutions of the present application, and does not represent an admission that the above is prior art.
Disclosure of Invention
In order to solve the above problems, the present application provides a voting data chaining method and device applying an intelligent contract, which can enable voting data chaining to be reliable and transparent.
A first aspect of the present application provides a voting data chaining method applying an intelligent contract, where the method includes:
receiving, by a blockchain node, a voting data uplink request sent by a first client, where the voting data uplink request includes voting data encrypted by a public key of the first client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing the cochain process of the voting data after the verification is passed;
the block chain node receives a query request of the voting data of a second client;
triggering a verification intelligent contract, wherein the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the block chain node sends the voting data query request to the first client, wherein the voting data query request comprises a second client public key, so that the first client encrypts the voting data by using the second client public key;
the block chain node receives a voting data query response sent by the first client, wherein the voting data query response comprises voting data encrypted by a public key of a second client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain linking process on the voting data encrypted by the public key of the second client after the verification is passed.
In one possible implementation, the method further includes: the block chain node receives a voting data query request sent by the second client;
and the block chain node sends a voting data query response to the second client, wherein the voting data query response comprises voting data encrypted by the public key of the second client, so that the second client can decrypt the voting data encrypted by the public key of the second client by using a self private key.
In a possible implementation manner, the voting data is operation data of a user corresponding to the first client on a voting platform, and includes voting times, voting time, and voting type.
In a possible implementation manner, the first client encrypts the voting data by using its own public key, specifically: and the first client encrypts the voting data by using a self public key according to a preset proportion.
In one possible implementation, the voting data includes an associated attribute and a non-associated attribute; and automatically superposing the attribute values of the voting data correlation attributes.
A second aspect of the present application provides a voting data uplink device applying an intelligent contract, where the device is a block chain node, and the device includes a receiving unit, a processing unit, and a sending unit; wherein,
the receiving unit is configured to receive a voting data uplink request sent by a first client, where the voting data uplink request includes voting data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, a chain link process of the voting data is executed;
the receiving unit is used for receiving a query request of the voting data of a second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the sending unit sends the voting data query request to the first client, where the voting data query request includes a second client public key, so that the first client encrypts the voting data with the second client public key;
the receiving unit is used for receiving a voting data query response sent by the first client, wherein the voting data query response comprises voting data encrypted by a public key of a second client;
and the processing unit triggers a verification intelligent contract, the verification intelligent contract verifies the identity of the first client, and after the verification is passed, the uplink process is executed on the voting data encrypted by the public key of the second client.
In a possible implementation manner, the receiving unit receives a polling data query request sent by the second client; the sending unit sends a voting data query response to the second client, where the voting data query response includes voting data encrypted by the public key of the second client, so that the second client decrypts the voting data encrypted by the public key of the second client by using its own private key.
In a possible implementation manner, the voting data is operation data of a user corresponding to the first client on a voting platform, and includes voting times, voting time, and voting type.
In a possible implementation manner, the first client encrypts the voting data by using its own public key, specifically: and the first client encrypts the voting data by using a self public key according to a preset proportion.
In one possible implementation, the voting data includes an associated attribute and a non-associated attribute; and automatically superposing the attribute values of the voting data correlation attributes.
The voting data chaining method and the voting data chaining device can link the voting data in a chaining mode, and the voting data in the chaining mode are credible and transparent in disclosure.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application.
Fig. 1 is a schematic flow chart of a voting data chaining method using an intelligent contract according to an embodiment of the present disclosure;
fig. 2 is a schematic flow chart of another voting data chaining method applying an intelligent contract according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a voting data uplink device applying an intelligent contract according to an embodiment of the present disclosure.
Detailed Description
In order to more clearly explain the overall concept of the present application, the following detailed description is given by way of example in conjunction with the accompanying drawings.
The terms "first," "second," and the like in the description and in the claims of the present application and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the order of such use may be interchanged under appropriate circumstances such that embodiments of the invention described herein may be practiced in other orders than those illustrated or described herein.
Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The block link point and the client referred to in the embodiment of the application may be understood as an abstract machine that responds to an external specific trigger condition and performs state conversion according to a certain rule, and may be a device that can be networked according to application software, such as a mobile phone, a tablet computer, a palm computer, a personal PC, and the like.
As shown in fig. 1, a voting data chaining method using an intelligent contract includes steps S101-S107.
S101, a block link node receives a voting data uplink request sent by a first client, wherein the voting data uplink request comprises voting data encrypted by a public key of the first client.
And S102, triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing the cochain process of the voting data after the verification is passed.
S103, the block chain node receives a query request of the voting data of a second client.
And S104, triggering a verification intelligent contract, and verifying the identity of the second client by the verification intelligent contract.
And S105, after the verification is passed, the block chain node sends the voting data query request to the first client, wherein the voting data query request comprises a second client public key, so that the first client encrypts the voting data by using the second client public key.
And S106, the block chain node receives a voting data query response sent by the first client, wherein the voting data query response comprises the voting data encrypted by the public key of the second client.
And S107, triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain process on the voting data encrypted by the public key of the second client after the verification is passed.
In one example, the method further comprises: the block chain node receives a voting data query request sent by the second client; and the block chain node sends a voting data query response to the second client, wherein the voting data query response comprises voting data encrypted by the public key of the second client, so that the second client can decrypt the voting data encrypted by the public key of the second client by using a self private key.
In one example, the voting data is operation data of a user corresponding to the first client on a voting platform, and includes voting times, voting time and voting type.
In one example, the first client encrypts the voting data with its own public key, specifically: and the first client encrypts the voting data by using a self public key according to a preset proportion.
In one example, the voting data includes an associated attribute and a non-associated attribute; and automatically superposing the attribute values of the voting data correlation attributes.
In the above example, the first client acts as an operator of the voting data, and the second client acts as an inquirer of the voting data; for a particular voting platform, each user can be either an operator of the voting data or a querier of the voting data.
The above voting data uplink method is described below with reference to fig. 2, and the method includes steps S201 to S214.
S201, the first client encrypts voting data generated by the first client by using a public key, wherein the voting operation data comprises data generated by user operation behaviors such as the voting times, the voting time, the IP address of the user, the account password of the user and the like of the user on a voting platform.
The first client encrypts the voting data generated by the first client with the own public key, where the encryption may be to encrypt all fields of the voting data, or to encrypt part of fields of the voting data, such as: only private comment content is encrypted; the user may not encrypt the voting data.
Further, the voting data includes two types of attributes, an associated attribute and a non-associated attribute. For example: the user voting time belongs to the non-associated attribute, and the voting time of each user can be stored in the block chain; for example: the number of votes of the users is the correlation attribute, the data format of a commodity comprises the number of votes, and the number of votes of the commodity can be automatically superposed as long as the users vote for the commodity.
The voting types comprise commodity voting, personal preference voting, clothing and dress voting and the like; for example: individuals vote on seasonal preferences, vote on clothing matching preferences, vote on clothing style preferences, vote on hair style preferences, and the like.
S202, the first ue sends a voting data uplink request to the blockchain node.
And S203, triggering a check intelligent contract on the block chain, checking the identity of the first client by the check intelligent contract, and executing the uplink process of the voting data.
The check is to determine whether the first ue is a user of the voting platform, and only the user of the voting platform can have permission to uplink the voting data.
It should be noted that the uplink process is a conventional process in the art and will not be described in detail. For example: and under the workload certification PoW common mode, packaging and verifying the data, wherein the block link point of the account right can place the packaged block in the next block of the current block as a new block uplink.
S204, the block link sends the voting data UL response to the first client.
S205, the second client sends a polling data query request to the blockchain node, where the polling data query request includes the public key of the second client.
At this time, the user corresponding to the second client may query the voting data after seeing the voting data. In the application, the first client and the second client are both terminal devices provided with decentralized application software, and can directly perform information interaction with the blockchain nodes on the blockchain.
And S206, triggering a check intelligent contract on the block chain, wherein the check intelligent contract checks the identity of the second client.
After the verification is passed, executing the next flow; the check fails and the process terminates.
And S207, after the verification is passed, the block link node sends a voting data query request to the first client, wherein the voting data query request comprises a public key of the second client.
And S208, the first client encrypts the voting data by using the second client public key.
S209, the first client sends a voting data query response to the blockchain node, where the voting data query response includes the voting data encrypted by the public key of the second client.
S210, triggering a check intelligent contract on the block chain, wherein the check intelligent contract checks the identity of the first client and executes the uplink process on the voting data encrypted by the public key of the second client.
S211, the block node sends a poll data query response to the second client.
S212, the second client sends a polling data query request to the blockchain node.
S213, the block node sends the polling response to the second client, where the polling response includes the polling data encrypted by the public key of the second client.
And S214, the second client decrypts the voting data encrypted by the public key of the second client by using the private key of the second client to obtain the voting data.
The voting data can be linked up, the link up process is public and transparent, and any user of the same voting platform can check the voting data; the authenticity of the voting data is guaranteed. In addition, the user can encrypt or not encrypt the voting data according to the preference of the user, and the user experience is improved.
As shown in fig. 3, a voting data uplink device applying an intelligent contract, where the device is a blockchain node, includes a receiving unit, a processing unit, and a sending unit.
The receiving unit is configured to receive a voting data uplink request sent by a first client, where the voting data uplink request includes voting data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, a chain link process of the voting data is executed;
the receiving unit is used for receiving a query request of the voting data of a second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the sending unit sends the voting data query request to the first client, where the voting data query request includes a second client public key, so that the first client encrypts the voting data with the second client public key;
the receiving unit is used for receiving a voting data query response sent by the first client, wherein the voting data query response comprises voting data encrypted by a public key of a second client;
and the processing unit triggers a verification intelligent contract, the verification intelligent contract verifies the identity of the first client, and after the verification is passed, the uplink process is executed on the voting data encrypted by the public key of the second client.
In one example, the receiving unit receives a voting data query request sent by the second client; the sending unit sends a voting data query response to the second client, where the voting data query response includes voting data encrypted by the public key of the second client, so that the second client decrypts the voting data encrypted by the public key of the second client by using its own private key.
In one example, the voting data is operation data of a user corresponding to the first client on a voting platform, and includes voting times, voting time and voting type.
In one example, the first client encrypts the voting data with its own public key, specifically: and the first client encrypts the voting data by using a self public key according to a preset proportion.
In one example, the voting data includes an associated attribute and a non-associated attribute; and automatically superposing the attribute values of the voting data correlation attributes.
The voting data can be linked up, the link up process is public and transparent, and any user of the same voting platform can check the voting data; the authenticity of the voting data is guaranteed. In addition, the user can encrypt or not encrypt the voting data according to the preference of the user, and the user experience is improved.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A voting data chaining method using a smart contract, the method comprising:
receiving, by a blockchain node, a voting data uplink request sent by a first client, where the voting data uplink request includes voting data encrypted by a public key of the first client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing the cochain process of the voting data after the verification is passed;
the block chain node receives a query request of the voting data of a second client;
triggering a verification intelligent contract, wherein the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the block chain node sends the voting data query request to the first client, wherein the voting data query request comprises a second client public key, so that the first client encrypts the voting data by using the second client public key;
the block chain node receives a voting data query response sent by the first client, wherein the voting data query response comprises voting data encrypted by a public key of a second client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain linking process on the voting data encrypted by the public key of the second client after the verification is passed.
2. The method of claim 1, further comprising:
the block chain node receives a voting data query request sent by the second client;
and the block chain node sends a voting data query response to the second client, wherein the voting data query response comprises voting data encrypted by the public key of the second client, so that the second client can decrypt the voting data encrypted by the public key of the second client by using a self private key.
3. The method of claim 1, wherein the voting data is operation data of a user corresponding to the first client on a voting platform, and includes a number of votes, a voting time, and a voting type.
4. The method according to claim 1, wherein the first client encrypts the voting data with its own public key, specifically:
and the first client encrypts the voting data by using a self public key according to a preset proportion.
5. The method of claim 1, wherein the voting data comprises associated attributes and non-associated attributes; wherein,
and automatically superposing the attribute values of the voting data correlation attributes.
6. A voting data uplink device applying an intelligent contract is characterized in that the device is a block chain node and comprises a receiving unit, a processing unit and a sending unit; wherein,
the receiving unit is configured to receive a voting data uplink request sent by a first client, where the voting data uplink request includes voting data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, a chain link process of the voting data is executed;
the receiving unit is used for receiving a query request of the voting data of a second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the sending unit sends the voting data query request to the first client, where the voting data query request includes a second client public key, so that the first client encrypts the voting data with the second client public key;
the receiving unit is used for receiving a voting data query response sent by the first client, wherein the voting data query response comprises voting data encrypted by a public key of a second client;
and the processing unit triggers a verification intelligent contract, the verification intelligent contract verifies the identity of the first client, and after the verification is passed, the uplink process is executed on the voting data encrypted by the public key of the second client.
7. The apparatus of claim 6,
the receiving unit is used for receiving a voting data query request sent by the second client;
the sending unit sends a voting data query response to the second client, where the voting data query response includes voting data encrypted by the public key of the second client, so that the second client decrypts the voting data encrypted by the public key of the second client by using its own private key.
8. The apparatus of claim 6, wherein the voting data is operation data of a user corresponding to the first client on a voting platform, and includes a number of votes, a voting time, and a voting type.
9. The device according to claim 6, wherein the first client encrypts the voting data with its own public key, specifically:
and the first client encrypts the voting data by using a self public key according to a preset proportion.
10. The apparatus of claim 6, wherein the voting data comprises an associated attribute and a non-associated attribute; wherein,
and automatically superposing the attribute values of the voting data correlation attributes.
CN201910547041.5A 2019-06-24 2019-06-24 A kind of polled data cochain method and its equipment for applying intelligent contract Pending CN110247921A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910547041.5A CN110247921A (en) 2019-06-24 2019-06-24 A kind of polled data cochain method and its equipment for applying intelligent contract

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910547041.5A CN110247921A (en) 2019-06-24 2019-06-24 A kind of polled data cochain method and its equipment for applying intelligent contract

Publications (1)

Publication Number Publication Date
CN110247921A true CN110247921A (en) 2019-09-17

Family

ID=67888964

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910547041.5A Pending CN110247921A (en) 2019-06-24 2019-06-24 A kind of polled data cochain method and its equipment for applying intelligent contract

Country Status (1)

Country Link
CN (1) CN110247921A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110738783A (en) * 2019-10-15 2020-01-31 腾讯科技(深圳)有限公司 System, method, device, equipment and readable storage medium for updating voting data
CN111475579A (en) * 2020-04-21 2020-07-31 吴海娟 Uplink voting method and system for intelligent contract in data sharing alliance chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110738783A (en) * 2019-10-15 2020-01-31 腾讯科技(深圳)有限公司 System, method, device, equipment and readable storage medium for updating voting data
CN111475579A (en) * 2020-04-21 2020-07-31 吴海娟 Uplink voting method and system for intelligent contract in data sharing alliance chain

Similar Documents

Publication Publication Date Title
CN110493261B (en) Verification code obtaining method based on block chain, client, server and storage medium
CN110232286B (en) E-commerce data chaining method and equipment applying intelligent contracts
CN112053274B (en) Construction guide method and device for government block chain network
CN110278270A (en) A kind of polled data cochain method and its equipment based on block chain
CN110225056A (en) A kind of evaluation data cochain method and its equipment for applying intelligent contract
CN110266696A (en) A kind of evaluation data cochain method and its equipment applied to block chain
CN110247918A (en) Number cochain method and its equipment are shaken applied to block chain
CN110247923A (en) Number cochain method and its equipment are shaken based on block chain
CN110247921A (en) A kind of polled data cochain method and its equipment for applying intelligent contract
CN110266699A (en) Prize drawing data cochain method and its equipment applied to block chain
CN110264206A (en) A kind of electric quotient data cochain method and its equipment based on block chain
CN110263529A (en) Number cochain method and its equipment are shaken using intelligent contract
CN110263100A (en) Using the shared economic data cochain method and its equipment of intelligent contract
CN110263563A (en) By means of the ad click data cochain method and its equipment of block chain
CN110266698A (en) Pass through the Knowledge Sharing data cochain method and its equipment of block chain
CN110232287A (en) Pass through the shared economic data cochain method and its equipment of block chain
CN110266695A (en) Using the lottery data cochain method and its equipment of intelligent contract
CN110245512A (en) Lottery data cochain method and its equipment applied to block chain
CN110263562A (en) A kind of evaluation data cochain method and its equipment based on block chain
CN110213294A (en) By means of the community data cochain method and its equipment of block chain
CN110233852A (en) Prize drawing data cochain method and its equipment based on block chain
CN110233853A (en) It is a kind of to thumb up data cochain method and its equipment applied to block chain
CN110266691A (en) Credit data cochain method and its equipment based on block chain
CN110213296A (en) It is a kind of that data cochain method and its equipment are thumbed up based on block chain
CN110264205A (en) A kind of electric quotient data cochain method and its equipment applied to block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication